CY2550 Midterm

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/255

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

256 Terms

1
New cards

What is exploitation?

taking advantage of something for personal gain

2
New cards

What is an example of exploitation?

When the phone phreakers used their knowledge of the phone network to get free phone calls (exploiting a "bug" in the phone system -- by blowing a whistle at the phone system it tricked the phone into thinking they paid and the network responded in kind)

OR

If Justin's students had cloned other people's key cards and used it to get into THEIR rooms (not their own rooms)

3
New cards

What is exploration?

use of knowledge to do things NOT for your own personal gain -- essentially want to see if you can do it

4
New cards

What is an example of exploration?

When the phone phreakers started they used their knowledge of the phone network to host group calls, looping around the planet, and locating strange corners on the phone system.

OR

When Justin's students wanted to see if they could clone a key card and trying it on their OWN door

5
New cards

What is vulnerability?

identified weakness within software, hardware or procedures

6
New cards

What is an example of a vulnerability?

employees at risk for phishing emails who do not undergo cybersecurity training; having a set schedule with a stalker

7
New cards

What is threat?

tactic or specific behavior that exploits a vulnerability within a device/procedure which could result in damage or destruction of assets

8
New cards

What is an example of a threat?

phishing emails sent to new, untrained employees

9
New cards

What is risk?

likelihood assets or personal info may be damaged or destroyed aka the likelihood that an attack/threat occurs via exploit of vulnerability

10
New cards

What is an example of risk?

A new employee who has no knowledge of cybersecurity procedures and is unaware of phishing emails is at high risk of being exploited

11
New cards

What is ad hoc security?

security in response to something or for a specific purpose

12
New cards

Why does ad hoc security rarely work?

Have you considered all possible attackers (what they want, why they want it, how willing they are to get it); Considered all possible attack surfaces (is the network secure, the OS secure, the hardware secure, are people secure); Weighed the tradeoffs of mitigations (costs --> financially feasible, alternative forms of risks, burden placed on users)

13
New cards

What is threat modeling?

process of systematically identifying threats faced by system

14
New cards

What is the process of threat modeling?

1. identify things of value you want to protect

2. enumerate the attack surfaces (physically, in person, internet, etc)

3. hypothesize attackers and map them to (a) things of value they want from you and (b) their ability to target vulnerable surfaces

4. survey mitigations

5. balance the costs vs the risks

15
New cards

What is the key idea of security?

deter the attacker from targeting your systems by making it so hard to gain access that it is not worth it to the attacker

16
New cards

What are the key factors for attacks?

when (before, during, after), where (local or remote), how (passive or active)

17
New cards

What is an attack that occurs before?

while an item is in their possession before it is being sent somewhere

18
New cards

What is an example of an attack that occurs before?

a. an employee at Amazon is not happy with Amazon because they are missing promotions so they insert malicious software on devices before shipping them out

b. inserting a USB/virus into a device after leaving it somewhere

c. inserting malware into a device and triggering it after you sell your computer to someone else

a. an employee at Amazon is not happy with Amazon because they are missing promotions so they insert malicious software on devices before shipping them out

19
New cards

What is an attack that occurs during?

item is in your possession

20
New cards

What is an example of an attack that occurs during?

a. an employee at Amazon is not happy with Amazon because they are missing promotions so they insert malicious software on devices before shipping them out

b. inserting a USB/virus into a device after leaving it somewhere

c. inserting malware into a device and triggering it after you sell your computer to someone else

b. inserting a USB/virus into a device after leaving it somewhere

21
New cards

What is an attack that occurs after?

when device is no longer in their possession

22
New cards

What is an example of an attack that occurs after?

a. an employee at Amazon is not happy with Amazon because they are missing promotions so they insert malicious software on devices before shipping them out

b. inserting a USB/virus into a device after leaving it somewhere

c. inserting malware into a device and triggering it after you sell your computer to someone else

c. inserting malware into a device and triggering it after you sell your computer to someone else

23
New cards

What is a local attack?

does the attack require close proximity?

24
New cards

What is an example of a local attack?

a. hijacking a phone's bluetooth while walking past them

b. stealing a phone

c. taking someone's phone and resetting their password

d. all of the above

d. all of the above

25
New cards

What is a remote attack?

attack over the internet

26
New cards

What is an example of a remote attack?

man in the middle attack

27
New cards

What is a passive attack?

attacker monitors and records data transmissions without changing them

28
New cards

What is an example of a passive attack?

a. packet sniffing (monitoring network traffic to capture sensitive data like passwords)

b. wiretapping (intercepting communications to listen in)

c. sending phishing emails/messages

d. both a and b

e. both b and c

f. both c and a

d. both a and b

29
New cards

What is an active attack?

When an attacker attempts to modify or delete data, or to prevent a network from operating correctly.

30
New cards

What is an example of an active attack?

a. sending phishing emails/messages

b. man in the middle attack

c. denial of service attack

d. actively probing someone's device

e. all of the above

e. all of the above

31
New cards

What are the possible attack surfaces for physical proximity?

steal and use device, direct connections via USB, close proximity radios (Bluetooth, NFC)

32
New cards

What are the attack surfaces for social engineering?

trick the user into installing malicious app(s)

33
New cards

What are the attack surfaces for a network?

passive eavesdropping, active attacks (man in the middle, SMS of death, etc)

34
New cards

What are the attack surfaces of a supply chain?

backdoor the OS, backdoor the handset (ex. OnePlus EngineeringMode), intercept and compromise handset in transit

35
New cards

(Hypothetical attackers) What are the capabilities of The Thief?

steal the phone, connect to USB or networks, disconnect the phone from the internet

36
New cards

(Hypothetical attackers) What are the goals of The Thief?

device itself, access to financial services

37
New cards

(Hypothetical attackers) How can you mitigate The Thief?

Strong authentication (strong password, biometrics), full device encryption, remote tracking and wiping

38
New cards

(The Thief) What are the issues with a strong password (strong authentication)?

annoying to enter

39
New cards

(The Thief) What are the issues with remote tracking and wiping?

won't work if the thief disconnects from the internet

40
New cards

(Hypothetical attackers) What are the capabilities of Law Enforcement?

steal phone, connect to USB or networks, disconnect phone from the internet, legally compel you to do things, infect you with surveillance malware

41
New cards

(Hypothetical attackers) What are the goals of Law Enforcement?

evidence from the device (messages, pictures, GPS logs)

42
New cards

(Hypothetical attackers) How can you mitigate Law Enforcement?

Strong authentication (strong password, biometrics), full device encryption, patch the OS and apps, avoid phishing attacks, don't use any cloud services

43
New cards

Why can you NOT use remote tracking and wiping when mitigating law enforcement?

obstruction fo justice --> crime

44
New cards

(Law enforcement) What are the issues with a strong password (strong authentication)?

annoying to enter

45
New cards

(Law enforcement) What are the issues with a biometrics (strong authentication)?

can compel you to unlock

46
New cards

(Law enforcement) What are the issues with patching the OS and apps?

manufacturers are slow to patch

47
New cards

(Law enforcement) What are the issues with avoiding phishing attacks?

requires constant vigilance

48
New cards

(Law enforcement) What are the issues with not using any cloud services?

prevents you from using most modern apps

49
New cards

(Hypothetical attackers) What are the capabilities of The Eavesdropper?

passively observe network traffic

50
New cards

(Hypothetical attackers) What are the goals of The Eavesdropper?

steal PII, passwords, bank account numbers, etc

51
New cards

(Hypothetical attackers) How do you mitigate The Eavesdropper?

use a Virtual Private Network (VPN)

52
New cards

(The Eavesdropper) Why can't you use HTTPS everywhere to mitigate attacks?

unclear which apps use HTTPS, no way to force HTTPS

53
New cards

(The Eavesdropper) What are the issues with using VPNs?

may slow your connection, free VPNs are scams

54
New cards

What mitigations are not relevant to prevent eavesdropping attacks?

strong authentication, full device encryption, patch OS and apps, avoid phishing attacks

55
New cards

(Hypothetical attackers) What are the capabilities of Three Letter Agencies?

passively observe network traffic, active network attacks

56
New cards

(Hypothetical attackers) What are the goals of Three Letter Agencies?

surveillance

57
New cards

(Hypothetical attackers) How do you mitigate attacks by Three Letter Agencies?

Use a VPN, use Tor, patch the OS and apps, disable JavaScript and plugins in web browser, no cloud services

58
New cards

(Three Letter Agencies) What are the issues with using VPNs?

free VPNs are scams, may slow your connection, does not provide anonymity

59
New cards

(Three Letter Agencies) What are the issues with using Tor?

very slow connection

60
New cards

(Three Letter Agencies) What are the issues with disabling JavaScript and plugins in web browser?

some websites will break

61
New cards

What is Tor?

fully encrypted/anonymous browser used to access the dark web and often used for illegal activities

62
New cards

How do you balance the cost and risk of mitigating against attacks?

assess the likelihood of different attacks (subjective --> change based upon context); compare to the cost of mitigations (risk/reward)

63
New cards

What is STRIDE?

designed to model and mitigate threats against software

64
New cards

What is the process of STRIDE?

1. identify assets

2. create an architecture overview (diagrams that map out the target system)

3. decompose the application (uncover vulnerabilities in design, implementation, or deployment)

4. identify the threats (keep the goals of attackers in mind)

5. document the threats

6. Rate the threats (prioritize and address the most significant threats)

65
New cards

What does the S in STRIDE stand for?

a. standing

b. spoofing

c. security

b. spoofing

66
New cards

What is spoofing (STRIDE)?

can I pretend to be someone else?

67
New cards

What does the T stand for in STRIDE?

a. tampering

b. traversable

c. tighten

a. tampering

68
New cards

What is tampering (STRIDE)?

can I maliciously change the content of the record?

69
New cards

What does the R stand for in STRIDE?

a. Repudiation

b. reproducible

c. reversible

a. Repudiation

70
New cards

What is repudiation (STRIDE)?

can I make the claim that I didn't do it?

71
New cards

What does the I stand for in STRIDE?

a. Information security

b. Information breach

c. Information disclosure

c. Information disclosure

72
New cards

What is information disclosure (STRIDE)?

can I obtain and publicly disclose your information?

73
New cards

What does the D stand for in STRIDE?

a. Denial of Service

b. Data

c. Defense

a. Denial of Service

74
New cards

What is denial of service (STRIDE)?

Can I hinder the performance of the server, and cause disruptions while preventing others from access?

75
New cards

What does the E stand for in STRIDE?

a. Escalation of the attack

b. Enumerability

c. Elevation/Escalation of Privileges

c. Elevation/Escalation of Privileges

76
New cards

What is elevation/escalation of privileges (STRIDE)?

can I obtain administrative privileges to install, modify, and configure your device?

77
New cards

What is DREAD?

method for calculating the risk scores for threats

78
New cards

What does the first D stand for in DREAD?

a. damage potential

b. damage caused

c. denial of service

d. desirability

e. discoverability

a. damage potential

79
New cards

What is damage potential (DREAD)?

how great is the damage if the vulnerability if exploited?

80
New cards

What is an example of damage potential (DREAD)?

10 million dollars in damages

81
New cards

What is the R in DREAD?

a. reproducibility

b. recorded

c. reversible

d. reduction of costs

a. reproducibility

82
New cards

What is reproducibility (DREAD)?

how easy is it to reproduce an attack?

83
New cards

What is an example of reproducibility (DREAD)?

the attack is very effective, but extremely difficult to execute/reproduce

84
New cards

What does the E stand for in DREAD?

a. Energy needed

b. Element of surprise

c. Exploitability

c. Exploitability

85
New cards

What is exploitability (DREAD)?

how easy is it to launch an attack?

86
New cards

What is an example of exploitability (DREAD)?

to launch the attack it requires deep knowledge and experience vs an attack that only requires the use of a browser

87
New cards

What does the A stand for in DREAD?

a. Affected users

b. Availability

c. Active v passive attack

a. Affected users

88
New cards

What is affected users (DREAD)?

as a rough percentage, how many users are affected?

89
New cards

What is an example of affected users (DREAD?

75% of users are affected

90
New cards

What does the second D stand for in DREAD?

a. damage potential

b. discoverability

c. desirability

e. damage caused

b. discoverability

91
New cards

What is discoverability (DREAD)?

how easy is it to find the vulnerability?

92
New cards

What is an example of discoverability (DREAD)?

everybody is aware of a design flaw in the company's system vs a vulnerability in a system that VERY few people know

93
New cards

What is an example of spoofing (STRIDE)?

an attacker sends an email from a fake email address to appear as if it comes from a legitimate source

94
New cards

What is an example of tampering (STRIDE)?

an attacker deleting important data/information from a data file

95
New cards

What is an example of repudiation (STRIDE)?

an attacker uses another users account to launch their attack and then denies being involved

96
New cards

What is an example of information disclosure (STRIDE)?

an attacker gains access to credit card information and publicly releases the credit card information

97
New cards

What is an example of denial of service (STRIDE)?

an attacker overloads an application with illegitimate requests in a short amount of time, overwhelming the application/website, bringing it down

98
New cards

What is an example of elevation/escalation of privileges (STRIDE)?

an attacker exploits a vulnerability in an authentication system, allowing them to gain administrator privileges, allowing them to change settings, steal sensitive information, etc

99
New cards

What are the fundamental goals of cryptography?

confidentiality (no eavesdropping), integrity (no unauthorized modifications), authenticity (no spoofing or faking), non-repudiation (no disclaiming of ownership)

100
New cards

What is the attacker threat model for passive interactions with messages and protocols (cryptography)?

only observes and attempts to decrypt messages --> only threatens confidentiality